in advance,
Erik Leunissen.
--
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
On 10/05/15 17:37, Erik Leunissen wrote:
Hi all,
The openssl gendsa command supports passphrase protected generation of
dsa keys.
I'm doing the dsa parameter and key generation, using the C API, using
DSA_generate_parameters(), DSA_generate_key() and DSA_print_fp()
Now, I'd like to write
Hi,
Does the OpenSSL C library have a function that returns the OpenSSL version?
Thanks in advance for your help,
Erik Leunissen.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
On 12/01/15 22:57, Erik Leunissen wrote:
Hi,
Does the OpenSSL C library have a function that returns the OpenSSL
version?
Never mind. I found it just after sending this post.
#include openssl/crypto.h
const char *SSLeay_version(int type);
Erik.
Thanks in advance for your help,
Erik
?
Thanks in advance for any clarification,
Erik Leunissen
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager
defined for its own usage and takes care
of proper referencing of SRC and BUILD directories.
Does the openssl roadmap foresee a further development in this area, or
is the current state deemed the right thing?
Thanks for your response,
Erik Leunissen
Richard Levitte wrote:
You're thinking of configuration scripts generated using auto* tools.
OpenSSL isn't one of those.
I confess that I did, but at the same time I question whether it matters
very much. As long as the Makefile is generated by *a* configure script,
such a script could
hasn't been made
public (yet). That might well be because no API *functions* are needed
for the use of DTLS. However, some data structures are public.
In your exploration of the openssl DTLS support, did you make use of the
header file dtls1.h?
Greetings,
Erik
Vladislav
Erik Leunissen
Erik Leunissen wrote:
So, indeed, it appears that the DTLS function interface hasn't been made
public (yet). That might well be because no API *functions* are needed
for the use of DTLS...
Of course I meant this to be:
So, indeed, it appears that no specific DTLS function interface has
My previous post (30/03/07 01:54) regarding DTLS support didn't receive
any replies. Maybe I wasn't clear. So here's the question rephrased:
Can somebody please point out the commands to do DTLS?
Thanks in advance,
Erik Leunissen
introduce new API's?
- If so, (where) have they been documented?
- If not, is there a difference in usage of the existing TLS API's
between securing TCP and securing UDP?
Thanks for any pointers/explanation,
Erik Leunissen
a better idea...
Right. I replaced the name_opt entry and now it works.
Hope it helps,
It did absolutely.
Greetings,
Erik Leunissen.
Ted
;)
__
OpenSSL Project http://www.openssl.org
that use My_CA (see below).
Can anybody say what's wrong? Please say so if you need further/other
information.
Thanks in advance,
Erik Leunissen
==
From the custom configguration file ca.conf:
[ ca
)
Is the observed pattern normal?
Thanks in advance for any advice,
Erik Leunissen.
=== test script ===
#! /bin/sh
openssl dsaparam -out dsaparam.pem 1024
openssl gendsa -out dsaprivatekey.pem dsaparam.pem
rm ./result
for file in ./text_1 ./text_2 ; do
cat $file result
echo result
Erik Leunissen wrote:
... The signatures (if expressed in hexadecimal format) all
start with an 8 byte sequence that matches the regular expression:
302[cde]021[45]
...
Of course that should be: the first 4 bytes, which corresponds to the
first 8 hex digits
Duh!
Erik Leunissen
Boris wrote:
... Maybe it would be a good idea to add this link to the return
values section of http://www.openssl.org/docs/crypto/EVP_EncryptInit.html
which explains only that 0 means failure.
I too find that some inter-related aspects of the OpenSSL libraries are
not linked/referred at
is stored in an error queue
associated with the current thread. The err library provides functions
to obtain these error codes and textual error messages.
Does this help?
Erik Leunissen.
__
OpenSSL Project
Thanks all for your valuable comments,
Erik Leunissen.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager
whether an
entropy source is lacking.
Erik Leunissen.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager
Richard Koenning wrote:
Call RAND_status() (see http://www.openssl.org/docs/crypto/RAND_add.html#).
Right. I overlooked that one.
Thanks,
Erik.
__
OpenSSL Project http://www.openssl.org
User
() ), or
- the warning mechanism doesn't work properly
Can anybody shed some light on what's happening here?
In case it's relevant: the DSA_* functions that I mentioned above, are
used in a program that has been running on Linux and on Windows 2000.
Thanks in advance,
Erik Leunissen
whether the PRNG has been seeded
before OpenSSL complains. How would I do that?
TIA,
Erik Leunissen
==
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
.
Please let me know if further particulars are desired because it is
significant.
Erik Leunissen
Valgrind output from a shared lib xxx that uses openssl0.9.8b
===
==29192== Conditional jump or move depends on uninitialised value(s
managed to pick a copy under
/usr/local/include while another one is available in /usr/include. Could
this be an issue regarding the configuration of my Linux system, or is
this an issue with the build configuration?
Erik Leunissen
, help,
Erik Leunissen
==
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager
what's wrong?
Thanks in advance,
Erik Leunissen
==
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List
key?
Could anybody please enlighten me?
Thanks in advance,
Erik Leunissen
==
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users
DSA_verify() believe the signature size to be different from
20 bytes, if I pass a hard coded 20 as the fifth argument to DSA_verify()?
- I don't understand which structure containing two 160 bit numbers
you're referring to.
Greetings,
Erik Leunissen
(). Adapting my code to variably sized signatures
made the errors go away.
I'm still curious though, about the signature structure that you
mentioned. Could you perhaps point me to any documentation regarding that?
Thanks in advance,
Erik Leunissen
Nils Larsch wrote:
doing a make clean before building the sources should help
It did indeed. Thanks a lot,
Erik Leunissen
==
__
OpenSSL Project http://www.openssl.org
User Support
.
Thanks in advance,
Erik Leunissen
==
System specification:
cpu: i586
Linux version: 2.4.21-202-athlon
gcc version: 3.3.1 (SuSE Linux)
openssl-0.9.7f
Build sequence and make output:
--
./config shared
make
The last lines from
did read the remark in the INSTALL file, saying:
Shared library is currently an experimental feature.
Can anybody clarify whether a build should be possible? If that should
be possible, what's gone wrong in my case?
Thanks in advance,
Erik Leunissen
==
make output follows
32 matches
Mail list logo